|Tuesday, January 28, 2020
You are here: Home » Technology


Technology

British Spy Agency Hacked Webcams from Millions of Computers

The British spy agency, aided by U.S. National Security Agency, captured and stored images from webcams of millions of Internet users worldwide who were not suspected of any malpractice, revealed secret documents released by The Guardian. The archives of the British agency, dating from 2008 to 2010, detail the use of a coded programs that used optical technology to store images from Yahoo chat database. In just six months, ...Read full article...

Researchers produce probiotics from bacteria found in baby feces

Researchers from the Institute of Research and Technology of Catalonia (IRTA) have isolated several strains of bacteria from lactic acid extracted from feces and, that after culturing, were used to ferment cured sausages. The results of the study were reported today by the Department of Agriculture, Livestock, Fisheries, Food and Environment, which oversees the IRTA. With the results found by IRTA, people who can not consume dairy products could ...Read full article...

Media Blackout on Smart Meter Dangers

By James F. Tracy Global Research January 22, 2014 Major power utilities continue to deploy “smart” electrical meters on businesses and private residences throughout the United States and Canada. Yet those in North America and elsewhere remain in the dark on the negative health effects of such devices that systematically blast their homes with radio-frequency (RF) radiation on a minute-by-minute, round-the-clock basis. In 2009 the Obama administration partnered with ...Read full article...

Digital Democracy vs. Corporate Dominance: R.I.P. Internet Neutrality?

Candidate Obama promised to “support the principle of network neutrality to preserve the benefits of open competition on the Internet.” President Obama did woefully little to do so. He’s waged war on free expression. He targets whistleblowers and journalists. He wants constitutional rights abolished. He’s been more lawless than any of his predecessors. Except while campaigning, he’s been largely silent on preserving Net Neutrality. It’s the last frontier of ...Read full article...

Swimming in a sea of frequencies: electromagnetic fields and us

By Alex Quinn Alliance for Natural Health January 3, 2013 Particularly now that wireless communications are so closely integrated into our daily lives, electromagnetic fields (EMFs) are all around us.  Our cities, especially the larger ones, are perpetually shrouded in an invisible electrosmog, a ‘sea’ of EMFs through which we swim every day.  But does this momentous development in civilisation come with health effects – and if so, can ...Read full article...

Technology dumbing down kids as young as 3 years old

By Bree Fowler AP Tablet computers are so easy to use that even a 3-year-old can master them. And that has some pediatricians and other health experts worried. Since navigating a tablet generally doesn’t require the ability to type or read, children as young as toddlers can quickly learn how to stream movies, scroll through family photos or play simple games. That ease-of-use makes tablets -and smartphones- popular with ...Read full article...

British Government allowed NSA to spy on British people

U.S. obtained permission to spy from the UK government, which allowed it ” unmask ” and analyze the phone numbers and fax numbers, email and Internet IP addresses of any British citizen. These details were obtained from a 2007 secret memo from the National Security Agency (NSA) of the United States, the one in charge of illegally eavesdropping pretty much everyone around the world. The original document was revealed ...Read full article...

US Weather Warfare Military Experiments

‘Climatic warfare’ has been excluded from the agenda on climate change “HAARP is a weapon of mass destruction, capable of destabilising agricultural and ecological systems globally.” “‘Climatic warfare’ potentially threatens the future of humanity, but has casually been excluded from the reports for which the IPCC received the 2007 Nobel Peace Prize.” Pdf version of article on Weather Warfare by Michel Chossudovsky, The Ecologist, December 2007 (pdf) Rarely acknowledged ...Read full article...

The U.S. Secret State and the Internet: “Dirty Secrets” and “Crypto Wars” from “Clipper Chip” to PRISM

Back in the 1990s, security researchers and privacy watchdogs were alarmed by government demands that hardware and software firms build “backdoors” into their products, the millions of personal computers and cell phones propelling communication flows along the now-quaint “information superhighway.” Never mind that the same factory-installed kit that allowed secret state agencies to troll through private communications also served as a discrete portal for criminal gangs to loot your ...Read full article...

Israeli Responsibility for Hacking Millions of French Phones?

Mossad’s credentials are notorious. They’re well known. It’s expertise is acknowledged. Its rap sheet is longstanding and nefarious. Its tactics include targeted assassinations, satellite, drone and other type spying, hacking and espionage expertise, computer viruses, other cyber attacks, bombings, sabotage, and other lawless practices. On October 25, France’s Le Monde headlined “The NSA’s intern inquiry about the Elysee hacking revealed.” Edward Snowden connected important dots for millions. Documents he released included ...Read full article...

NSA Revelations: Access to Email Address Books, “Monitoring Everybody Electronically”

NSA is one of 16 known US spy agencies. It operate globally. It’s the world’s biggest spy agency. Advanced technology lets it go where no previous counterpart went before. Privacy no longer exists. Congress ignores its lawlessness. Oversight is absent. NSA takes full advantage.  Two Washington Post articles revealed more. They’re based on documents Edward Snowden provided. Expect lots more disclosures ahead. On October 14, WaPo headlined “NSA collects ...Read full article...

US Approves human computer chip “for your convenience”

Medical milestone or privacy invasion? A tiny computer chip approved Wednesday for implantation in a patient’s arm can speed vital information about a patient’s medical history to doctors and hospitals. But critics warn that it could open new ways to imperil the confidentiality of medical records. The Food and Drug Administration said Wednesday that Applied Digital Solutions of Delray Beach, Fla., could market the VeriChip, an implantable computer chip ...Read full article...

Neuroweapons, Neuroscience and “Brain Circuit Manipulation”

Inside Story of the United States’ Mind Control Project In September 2013 the US National Institutes of Health ( NIH) issued an report titled, “Interim Report: Brain Research through Advancing Innovative Neurotechnologies (BRAIN) working group.” The report has extensively examined President Barack Obama’s brain project, which mentions the need to develop electromagnetic modulation as a new technology for brain circuit manipulation. In the meantime, the weekend edition of the ...Read full article...

Facebook facial recognition feature under the magnifying glass

U.S. officials will examine changes to Facebook Inc’s (FB.O) privacy policy to determine whether they violate a 2011 agreement with federal regulators, a Federal Trade Commission spokesman confirmed Wednesday after certain changes drew fire from privacy advocates. Much of the criticism has focused on a proposed “Tag Suggest” feature that would use facial recognition technology to match faces in photos with public profile features, part of a broad set ...Read full article...

US Supercomputers brake encryption to carry out spying operations

* Computer manufacturers install spying chips that let NSA access computers sold to foreign governments. * US shares information collected illegally with British, Canadian, Australian and New Zealand intelligence. The Internet security standards have been exposed after the National Intelligence Agency (NSA ) ‘corrupted’ them to make them vulnerable to their technology in order to facilitate espionage. The information has been revealed by The New York Times and extracted ...Read full article...